• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / Security and Privacy / Security reports released from Microsoft, Symantec, and others

Security reports released from Microsoft, Symantec, and others

2013-04-23 by Jason

Microsoft, Symantec, Verizon, and Trend Micro have all released security reports recently. There must have been enough time since the last quarter ended or something else coordinating them.

The reports cover topics like data breaches, vulnerabilities, exploits, hacktivism, malware, and more.

If you are a security-minded individual, give these a read through to learn about the latest trends in information security.

Verizon 2013 Data Breach Investigations Report

This year’s DBIR combines the expertise of 19 organizations from around the globe. Download the report to discover stats that might surprise you—from the percentage of espionage-related attacks to the astonishing length of time it often takes to spot a security breach. By knowing today’s threats, you can better protect your organization tomorrow.

Verizon 2013 dbir thumb

Trend Micro 1Q 2013 Security Roundup (pdf)

Zero-Days hit users hard at the start of the year

trendmicro 2013

Microsoft Security Intelligence Report Volume 14

The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people.

virus in code

Symantec Internet Security Threat Report Volume 18

Report (pdf) | Infographic (pdf) | Making Sense of the Numbers | Report shows changing cybercriminal tactics

Key Findings

  • 42% increase in targeted attacks in 2012.
  • 31% of all targeted attacks aimed at businesses with less than 250 employees.
  • One waterhole attack infected 500 organizations in a single day.
  • 14 zero-day vulnerabilities.
  • 32% of all mobile threats steal information.
  • A single threat infected 600,000 Macs in 2012.
  • Spam volume continued to decrease, with 69% of all email being spam.
  • The number of phishing sites spoofing social networking sites increased 125%.
  • Web-based attacks increased 30%.
  • 5,291 new vulnerabilities discovered in 2012, 415 of them on mobile operating systems.

symantec istr

Filed Under: Security and Privacy

Trending

  • What can home automation do for you?
    In Infographics
  • Remote Administration – Troubleshooting without leaving your chair
    In Software, System Administration, Tech Solutions
  • Improving Vista
    In Operating Systems, Software, Tech Solutions

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in